The Tycoon2FA phishing kit now supports device-code phishing attacks and abuses Trustifi click-tracking URLs to hijack ...
Attackers performed an email takeover attack on a dormant maintainer account and published new node-ipc versions containing ...
If you are building a simple dashboard or a form-based application, the traditional JSON API (REST or GraphQL) approach is ...
Ghostwriter’s March 2026 Ukraine attacks use PDF lures and geofencing to deploy Cobalt Strike on government targets.
This latest ESET Research report documents new activity observed that started in March 2026, showing continued evolution of tooling and compromise chains. The group primarily targets governmental, ...
A known Belarussian cyber-espionage group is back with a threat campaign against targets in Eastern Europe that uses spear-phishing to deliver malicious payloads to Eastern European government and ...
A fake repo impersonating the OpenAI Privacy Filter model racked up 244,000 downloads in under 18 hours before Hugging Face ...
Mini Shai-Hulud worm compromises 169 npm packages including TanStack Mistral AI; TeamPCP uses stolen OIDC tokens.
TeamPCP’s Mini Shai-Hulud campaign used hijacked GitHub OIDC tokens to spread a credential-stealing worm through TanStack npm ...
Javascript must be enabled to use this site. Please enable Javascript in your browser and try again. Free Webinar: Fraud on the Line—Phone & Text Scams, May 18, 3 ...
Microsoft admits it didn't expect Win32 to survive until 2026. After years of RAM-heavy web apps, Windows 11 is going back to ...
Nitro Software, a trusted global provider of PDF, eSign, and AI-powered document automation solutions, today announced early access to Nitro MCP, a Model Context Protocol (MCP) connector that brings ...